ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf

上传人:刘芸 文档编号:739352 上传时间:2019-01-12 格式:PDF 页数:16 大小:103.50KB
下载 相关 举报
ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf_第1页
第1页 / 共16页
ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf_第2页
第2页 / 共16页
ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf_第3页
第3页 / 共16页
ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf_第4页
第4页 / 共16页
ETSI TS 102 656-2014 Lawful Interception (LI) Retained Data Requirements of Law Enforcement Agencies for handling Retained Data (V1 2 2)《合法侦听 (LI) 保留数据 用于处理保留数据的执法机构的要求 (V1 2 2)》.pdf_第5页
第5页 / 共16页
点击查看更多>>
资源描述

1、 ETSI TS 102 656 V1.2.2 (2014-09) Lawful Interception (LI); Retained Data; Requirements of Law Enforcement Agencies for handling Retained Data TECHNICAL SPECIFICATION ETSI ETSI TS 102 656 V1.2.2 (2014-09)2Reference RTS/LI-00118 Keywords handover, retention, security ETSI 650 Route des Lucioles F-069

2、21 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present docu

3、ment may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/

4、or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current st

5、atus of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or

6、utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend

7、to reproduction in all media. European Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members an

8、d of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 102 656 V1.2.2 (2014-09)3Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g3Introduction 4g31 Scope 5g32 References 5g32.1 Normative re

9、ferences . 5g32.2 Informative references 5g33 Definitions and abbreviations . 5g33.1 Definitions 5g33.2 Abbreviations . 6g34 User (LEA) requirements . 7g34.1 Introduction 7g34.2 General requirements . 7g34.3 Requests . 7g34.4 Request for retained data 8g34.5 Delivery 8g34.6 Content of delivery . 9g3

10、4.7 Location information 10g34.8 Availability constraints . 11g34.9 Information transmission and information protection requirements 11g34.10 Internal security 12g34.11 Technical handover interfaces and format requirements 12g34.12 Temporary obstacles to transmission . 12g34.13 Identification of the

11、 request criteria 12g34.14 Multiple requests 13g3Annex A (normative): Administrative requirements 14g3A.1 Non disclosure 14g3A.1.1 CSP . 14g3A.1.2 Manufacturers or 3rdparty providers 14g3Annex B (informative): Change Request History 15g3History 16g3ETSI ETSI TS 102 656 V1.2.2 (2014-09)4Intellectual

12、Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs

13、); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been car

14、ried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technic

15、al Committee Lawful Interception (LI). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “may not“, “need“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms

16、for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction The multi CSP, multi LEA and multinational aspect of the retained data creates the need for a standardized requests and the delivery of the data. The presen

17、t document describes similar to the requirements for lawful interception in TS 101 331 1 the law enforcement needs for the request and delivery and related aspects of retained data. The definition of a handover interface for the request and delivery should allow the technical facilities to be provid

18、ed: - with reliability; - with accuracy; - at low cost; - with minimum disruption and most speedily; - in a secure manner; - using standard procedures. ETSI ETSI TS 102 656 V1.2.2 (2014-09)51 Scope The present document gives guidance for the delivery and associated issues of retained data of telecom

19、munications and subscribers. It provides a set of requirements relating to handover interfaces for the retained traffic data and subscriber data by law enforcement and other authorized requesting authorities. The present document describes the requirements from a Law Enforcement Agencys (LEAs) point

20、 of view. Not all requirements necessarily apply in one individual nation. These requirements may be used to derive specific network requirements and furthermore to standardize handover interfaces. The present document gives the requirements for the delivery of Retained Data (in line with TS 101 331

21、 1 for LI). NOTE: Reading the present document it should be taken in account that: square4 Limitations in what data to be retained are a national issue. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specif

22、ic references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. N

23、OTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. 1 ETSI TS 101 331: “Lawful Interception (LI)

24、; Requirements of Law Enforcement Agencies“. 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. Not applicable. 3 Definitions and abbreviations 3.1 Definitions

25、For the purposes of the present document, the following terms and definitions apply: cell ID: identity of the cell from which a mobile telephony call originated or in which it terminated Communication Service Provider (CSP): generic description covering Access Provider, Service Provider and Network

26、Operator data: traffic data and location data and the related data necessary to identify the subscriber or user ETSI ETSI TS 102 656 V1.2.2 (2014-09)6Law Enforcement Agency (LEA): organization authorized by a lawful authorization based on a national law to receive the results of telecommunications r

27、etained data lawful authorization: permission granted to a LEA under certain conditions to request specified telecommunications retained data and requiring co-operation from a network operator/service provider/access provider NOTE: Typically, this refers to a warrant or order issued by a lawfully au

28、thorized body. location information: information relating to the geographic, physical or logical location of an identity relating to an interception subject quality of service: quality specification of a telecommunications channel, system, virtual channel, computer-telecommunications session, etc. N

29、OTE: Quality of service may be measured, for example, in terms of signal-to-noise ratio, bit error rate, message throughput rate or call blocking probability. reliability: probability that a system or service will perform in a satisfactory manner for a given period of time when used under specific o

30、perating conditions request criteria: identity associated with a retained data to be delivered target identity: identity associated with a retained data to be delivered telecommunications: any transfer of signs, signals, writing images, sounds, data or intelligence of any nature transmitted in whole

31、 or in part by a wire, radio, electromagnetic, photoelectric or photo optical system telephone service: calls (including voice, voicemail and conference and data calls), supplementary services (including call forwarding and call transfer) and messaging and multi-media services (including short messa

32、ge services, enhanced media services and multi-media services) unsuccessful call attempt: communication where a telephone call has been successfully connected but not answered or there has been a network management intervention. user: any legal entity or natural person using a publicly available ele

33、ctronic communications service, for private or business purposes, without necessarily having subscribed to that service user ID: unique identifier allocated to persons when they subscribe to or register with an Internet access service or Internet communications service 3.2 Abbreviations For the purp

34、oses of the present document, the following abbreviations apply: CSP Communication Service Provider DSL Digital Subscriber Line GPRS General Packet Radio Service GPS Global Positioning SystemGSM Global System for Mobile communications HLR Home Location Register ID IDentity IMEI International Mobile

35、Equipment Identity IMSI International Mobile Subscriber Identity IP Internet Protocol ISO International Organization for Standardization LEA Law Enforcement AgencyLI Lawful Interception VLR Visited Location Register WLAN Wireless Local Area Network xDSL any Digital Subscriber Line technology ETSI ET

36、SI TS 102 656 V1.2.2 (2014-09)74 User (LEA) requirements 4.1 Introduction This clause presents the user requirements related to the retained data of telecommunications with the LEA being the user. The relevant terms are defined in clause 3.1. These user requirements are subject to national law and i

37、nternational treaties and should be interpreted in accordance with applicable national policies. The following list of requirements is a collection of items, where several requirements might not correspond to national laws and regulations of the individual countries. Implementation takes place if re

38、quired by national law. The Handover Interface(s) (HIs) should be configured in such a way that it (they) complies with the appropriate national requirements. A lawful authorization may specify a subset of requirements to be delivered on a case-by-case basis, this is based on the national regulation

39、 for different LEAs. 4.2 General requirements a) The obligation of the Communication Service Provider (CSP) as to which data shall be retained and delivered is subject to national laws. b) The obligation of the CSP as to which period the data shall be retained subject to national laws. c) The CSP wi

40、ll be able to provide data of subscriber and subscriber related traffic data that was generated or processed within the retention period within its telecommunications system. d) The CSP will be able to provide data received from other networks that was generated or processed (originated, terminated

41、or forwarded) within the retention period within its telecommunications system. e) The present document relates only to data generated or processed as a consequence of a communication or a communication service and does not relate to data that are the content of the information communicated. Data ge

42、nerated or processed when supplying the communications services concerned refers to data which are accessible. In particular the obligation to retain data may apply only in respect of data from the providers or the network providers own services. f) Given that the obligations on providers of electro

43、nic communications services should be proportionate, this requires that they retain only such data as are generated or processed in the process of supplying their communications services. To the extent that such data are not generated or processed by those providers, there is no obligation to retain

44、 them. There is no intention to harmonize the technology for retaining data, the choice of which is a matter to be resolved at national level. NOTE 1: The retention of data applies to the use of services. This applies to subscribers, visitors, etc. of the service. NOTE 2: The retention of data appli

45、es to all calls or services including those from roaming scenarios, e.g. mobile roaming records (ISO spec). 4.3 Requests a) The requests for retained data can apply to: 1) data generated or processed in association with communication or communication attempts (typically unsuccessful calls) (in accor

46、dance with particular national requirements); 2) subscriber data. b) The requests for retained data will be based on the request criteria defined in clause 4.4. c) The request shall not require the CSP to make any subjective decisions, to use any judgement or discretion. In other words, requests sha

47、ll be such that it is immediately clear whether a particular record matches the request. d) The requests will be done by lawful authorization. ETSI ETSI TS 102 656 V1.2.2 (2014-09)8e) A lawful authorization can contain a combination of: 1) a single request based on a single request criterion; 2) mul

48、tiple requests based on an aggregation of single request criteria; 3) a request based on a range of request criteria. NOTE: A request that conforms to the ETSI standard should not be assumed to be lawful under all jurisdictions. The delivery interface is not required to provide such a guarantee. It

49、is assumed that national and international procedures are also in place to assure that the request is lawful. 4.4 Request for retained data a) The request criteria for retained subscriber data shall contain the time stamp or time window and can be based on: 1) a service or network identifier: i) network or service address (for example E.164, IP address, email, uri); ii) equipment identifier (for example IMEI); iii) network element (for example base station Global CellID); or 2) a name: A name identifying for example the subscriber or registered user of the CSP; or 3

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1